Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Understanding Operating Systems: Definition and Functions

Posted by |luis eduardo and classified in Computers

Written on in English with a size of 2.12 KB

Operating Systems

What are operating systems? This question can be answered at several levels.

Firstly, an operating system is a program, or a set of programs. Operating systems vary in size from very small to very large, but all are pieces of software. In the past, almost all operating systems were written in a low-level language. Currently, many operating systems are partly or completely written in a high-level language.

Secondly, an operating system is, by virtue of its name, a system. It is a collection of parts working together towards some common goals. The goals or objectives of an operating system may be regarded as the manager of these resources.

Thirdly, a computer may be regarded as a set of devices, or resources, which provide a number... Continue reading "Understanding Operating Systems: Definition and Functions" »

Core Networking Concepts: TCP/IP, Routers, and DNS

Classified in Computers

Written on in English with a size of 4.44 KB

TCP/IP Protocol Suite Characteristics

  • Based on open and free protocols and standards.
  • Provides software and hardware independence.
  • Uses a common addressing scheme allowing any TCP/IP device to locate another anywhere on the network.
  • Includes high-level, standardized protocols supporting widely available and consistent user services.
  • Acts as a de facto standard for networking.
  • Allows the interconnection of networks with diverse features and technologies.

Internet Protocol Family Fundamentals

The Internet protocol family, commonly known as TCP/IP, is a set of network protocols fundamental to the Internet, enabling data transmission between computer networks. Examples include HTTP, ARP, Telnet, and POP.

Understanding Routers and Their Function

Routers are... Continue reading "Core Networking Concepts: TCP/IP, Routers, and DNS" »

WAN, Switching, and DSL Technologies: Understanding Network Connections

Classified in Computers

Written on in English with a size of 3.51 KB

Understanding Wide Area Networks (WANs)

A WAN (Wide Area Network) spans a large geographic area, sometimes a country or continent. It contains a collection of machines dedicated to running user programs. These machines are called Hosts. The hosts are connected by a communication subnet. The subnet's job is to conduct messages from one host to another. The separation of the unique aspects of the communication network (subnet) and areas of application (hosts) greatly simplifies the overall design of the network.

Key Components of a WAN

  • Switching Computers (ECD): Each ECD uses a protocol responsible for routing the data correctly and providing support to computers and end-user terminals connected to it.
  • Computer User (DTE): The DTE support function
... Continue reading "WAN, Switching, and DSL Technologies: Understanding Network Connections" »

Disney Transport Layer: Understanding Network Communication

Classified in Computers

Written on in English with a size of 4.2 KB

Disney Transport Layer Considerations

The transport layer is the heart of the whole hierarchy of protocols.

Function: To provide efficient, reliable, and economic data transport processes for the application layer, regardless of the physical network or networks.

There are two types of service: connection-oriented and connectionless.

If there is an error in the lower layers, where n can be controlled at higher x, the error is corrected at the transport layer.

  • Disorders
  • Duplication
  • Loss

Causes of errors:

  • Cable errors
  • Interference
  • Inadequate blockade operation

Functions in the Transport Layer

  • End-to-end reliable communication
  • Error control
  • Flow control
  • Multiplexing of several connections

Origin and destination communicate through a network. The transport layer... Continue reading "Disney Transport Layer: Understanding Network Communication" »

Biometric Authentication: Enhancing Security in Physical Spaces

Classified in Computers

Written on in English with a size of 4.46 KB

Biometric Systems: Enhancing Security

Biometric systems, applied to information systems, allow for the authentication of individuals using electronic technologies. These technologies employ complex mathematical formulas to ensure that the person applying for entry to a resource, or a physical space, is who they claim to be.

Increased Security with Biometric Access Systems

Personal identification methods to control access are based on:

  • Something you know: passwords or access keywords.
  • Something you own: for example, an encoded magnetic card.
  • A personal characteristic: such as fingerprints or iris.

Combining two or more methods provides an even higher level of security.

Biometrics: Key Characteristics

  • Universality: All individuals possess this characteristic.
... Continue reading "Biometric Authentication: Enhancing Security in Physical Spaces" »

Understanding Fractions and Decimal Expressions

Classified in Computers

Written on in English with a size of 2.77 KB

Fractions and Their Classifications

A fraction is a ratio of two integers.

Classification

  • Proper: The numerator is smaller than the denominator, representing a number less than 1.
  • Improper: The numerator is larger than the denominator, representing a number greater than 1.
  • Apparent: The multiple of the denominator and numerator represents an integer.
  • Mixed Numbers: These have a whole number part and a fractional part. They arise from improper fractions. To convert an improper fraction to a mixed number, divide the numerator by the denominator. The quotient is the whole number, the remainder is the new numerator, and the denominator stays the same.

Decimal Expression

A decimal expression is the result of dividing the numerator by the denominator of... Continue reading "Understanding Fractions and Decimal Expressions" »

Component Architecture: Layers, Objects, and Associations

Classified in Computers

Written on in English with a size of 2.54 KB

Component Architecture

A component diagram illustrates the three layers:

  • User layer (interface)
  • Login layer (business rules)
  • Data layer (database)

The use of interfaces and menus indicates who created the interface design.

Object Fundamentals

Class -> identity + state + behavior

Denormalization: The process of reverting from normalization, accepting redundancy and data dependencies to improve data performance. Data - Entity (instance, records)

Object Properties

Object properties:

  • Encapsulation: Objects hide their attributes, state, and behavior from other objects.
  • Inheritance: An object can inherit attributes and behavior from other objects.
  • Overriding: The ability to change or modify inherited attributes or behavior.
  • Composition: An object can be composed
... Continue reading "Component Architecture: Layers, Objects, and Associations" »

Digital and Analog Signals: Input and Output Channels

Classified in Computers

Written on in English with a size of 2.58 KB

Digital Awareness

When you want to receive digital information from the outside: The business card input channels are available, usually in groups of 8 bits, to which binary information is assigned by a program. These can be assigned to an internal variable state of a byte by a reading instruction that may have a port. There can be one or more bytes of input, assigning each an address.

Analog Outputs

To send analog control signals to the outside, the tallies have one or more channels of output through their respective A/D converters. A 1V analog converter generates a constant proportional to the numerical value of the digital data that it has on its input lines. Internally, they have a 5V memory. Different voltage ranges can be obtained using... Continue reading "Digital and Analog Signals: Input and Output Channels" »

Essential Linux Commands for File Management

Classified in Computers

Written on in English with a size of 4.57 KB

Essential Linux Commands for File Management

Basic Operations

  • mkdir /Destination/Name: Creates an empty directory named Name at the specified Destination.
  • touch /Source: Updates the access and modification date of the Source file to the current time. If the file does not exist, it creates an empty file.

Copying Files

  • cp /Source/Destination: Copies the Source file to the Destination with the same name.
  • cp -r /Source/Destination: Recursively copies files from the Source directory to the Destination directory, preserving the directory structure and file names.

Moving Files

  • mv -f /Source/Destination: Moves the Source file to the Destination, overwriting any existing file with the same name.
  • mv -u /Source/Destination: Moves the Source file to the Destination
... Continue reading "Essential Linux Commands for File Management" »

C Programming Language: Functions, Pointers, and Files

Classified in Computers

Written on in English with a size of 4.96 KB

Functions in C

Void functions provide a way to emulate what are called procedures in other languages (e.g., PASCAL). They are used when it is not required to return a value. Here is an example that prints the squares of certain numbers:

void square ()
{
int count;

for (counter = 1; count < 10; counter++)
printf ("%d\n", counter * counter);
}

main ()
{
square ();
}

Input and Output Parameters

To use parameters in/out, the formal parameter must be preceded by the ampersand symbol (&), and the current parameter must be a variable (not an expression). Input/output parameters are used when you want a procedure to change the contents of the current variable. The fact that these parameters are explicitly defined as variables makes the programmer aware of... Continue reading "C Programming Language: Functions, Pointers, and Files" »